White Papers
Table Of Contents
- Dell Trusted Device Technical Advisories v3.6
- Contents
- Technical Advisories
- Contact Dell ProSupport
- New Features and Functionality v3.6
- Resolved Security Advisories v3.6
- Resolved Technical Advisories v3.5
- Technical Advisories v3.6
- New Features and Functionality v3.5
- Resolved Security Advisories v3.5
- Resolved Technical Advisories v3.5
- Technical Advisories v3.5
- New Features and Functionality v3.4
- Resolved Security Advisories v3.4
- Resolved Technical Advisories v3.4
- Technical Advisories v3.4
- New Features and Functionality v3.3
- Resolved Security Advisories v3.3
- Resolved Technical Advisories v3.3
- Technical Advisories v3.3
- New Features and Functionality v3.2
- Resolved Security Advisories v3.2
- Resolved Technical Advisories v3.2
- Technical Advisories v3.2
- New Features and Functionality v3.1
- Resolved Security Advisories v3.1
- Resolved Technical Advisories v3.1
- Technical Advisories v3.1
- New Features and Functionality v3.0
- Resolved Security Advisories v3.0
- Resolved Technical Advisories v3.0
- Technical Advisories v3.0
- New Features and Functionality v2.11
- Resolved Security Advisories v2.11
- Resolved Technical Advisories v2.11
- Technical Advisories v2.11
- New Features and Functionality v2.10
- Resolved Security Advisories v2.10
- Resolved Technical Advisories v2.10
- Technical Advisories v2.10
- New Features and Functionality v2.9
- Resolved Security Advisories v2.9
- Resolved Technical Advisories v2.9
- Technical Advisories v2.9
- New Features and Functionality v2.8
- Resolved Security Advisories v2.8
- Resolved Technical Advisories v2.8
- Technical Advisories v2.8
- New Features and Functionality v2.7
- Resolved Security Advisories v2.7
- Resolved Technical Advisories v2.7
- Technical Advisories v2.7
- New Features and Functionality v2.6
- Resolved Security Advisories v2.6
- Resolved Technical Advisories v2.6
- Technical Advisories v2.6
- New Features and Functionality v2.5
- Resolved Security Advisories v2.5
- Resolved Technical Advisories v2.5
- Technical Advisories v2.5
- New Features and Functionality v2.4
- Resolved Technical Advisories v2.4
- Technical Advisories v2.4
- New Features and Functionality v2.3
- Resolved Technical Advisories v2.3
- Technical Advisories v2.3
- New Features and Functionality v2.2
- Resolved Technical Advisories v2.2
- Technical Advisories v2.2
- New Features and Functionality v2.1
- Resolved Technical Advisories v2.1
- Technical Advisories v2.1
- New Features and Functionality v1.7
- Resolved Technical Advisories v1.7
- Technical Advisories v1.7
- New Features and Functionality v1.6
- Resolved Technical Advisories v1.6
- Technical Advisories v1.6
- New Features and Functionality v1.5
- Resolved Technical Advisories v1.5
- Technical Advisories v1.5
- New Features and Functionality v1.4
- Resolved Technical Advisories v1.4
- Technical Advisories v1.4
- New Features and Functionality v1.3
- Resolved Technical Advisories v1.3
- Technical Advisories v1.3
- New Features and Functionality v1.2
- Resolved Technical Advisories v1.2
- Technical Advisories v1.2
- New Features and Functionality v1.1
- Resolved Technical Advisories v1.1
- Technical Advisories v1.1
New Features and Functionality v2.1
● Trusted Device documentation (previously BIOS Verification) is now located on the following landing page: https://
www.dell.com/support/home/us/en/19/product-support/product/trusted-device/docs.
● The BIOS Verification agent is now rebranded to the Dell Trusted Device agent.
NOTE: BIOS Verification remains a feature of the Dell Trusted Device agent.
● Trusted Device now runs as a Windows service.
● BIOS Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may
indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise
computers locally or remotely. These attack vectors can be monitored then mitigated through the BIOS Events & Indicator
of Attack features' ability to monitor BIOS attributes. If the Trusted Device agent is active on the computer, BIOS Events &
Indicators of Attack runs every 12 hours by default.
It is recommended using a SIEM product to retrieve logs and events. Administrators should provide results to their SOC
team to determine appropriate remediation strategies.
Find BIOS Events & Indicator of Attack notifications in Event Viewer under Windows Logs > System with Source type
Trusted Device.
● To change BIOS attributes interval polling, set the following registries.
○ This entry configures the time period in seconds between BIOS attribute sweeps.
HKLM\SOFTWARE\Dell\TrustedDevice\
DWORD=SecondsBetweenAttributeSweeps
Minimum value in seconds = 3600 (1 hour)
Maximum value = 172800 (48 hours)
Default = every 12 hours
Value (in decimal) = 3600 - sweeps occur every one hour
Value (in decimal) = 172800 - sweeps occur every 48 hours
○ This entry changes the delay in milliseconds between each individual BIOS attribute retrieval.
HKLM\SOFTWARE\Dell\TrustedDevice\
DWORD=MSBetweenAttributeReads
Minimum value in milliseconds = 500
Maximum value in milliseconds = 2000
Default = every 500 ms
Value (in decimal) = 500 - reads a different BIOS attribute every 500 ms
Value (in decimal) = 2000 - reads a different BIOS attribute every 2000 ms
● The following platforms are supported by BIOS Events & Indicators of Attack:
○ Latitude 3301
○ Latitude 3400
○ Latitude 3500
○ Latitude 5300
○ Latitude 5300 2-in-1
○ Latitude 5400
○ Latitude 5401
○ Latitude 5500
○ Latitude 7200 2-in-1
○ Latitude 7300
○ Latitude 7400
○ Latitude 7400 2-in-1
○ Optiplex 7070 Ultra
○ Optiplex 7071 Tower
○ Precision 3540
16
Technical Advisories